Side effects: • Can be used by rogue users or malware to lower security settings • Can be used to modify system settings that allow or augment potential malware behaviour. • Makes use of software vulnerability • CVE-2009-3867

Description inserted by Alexander Bauer on Tuesday, December 7, 2010Description updated by Alexander Bauer on Tuesday, December 7, 2010